TY - GEN
T1 - Cooperative jamming with untrusted SUs for secure communication of two-hop primary system
AU - Wang, Dawei
AU - Ren, Pinyi
AU - Wang, Yichen
AU - Du, Qinghe
AU - Sun, Li
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/10/2
Y1 - 2015/10/2
N2 - This paper investigates the problem of secure communications of the two-hop primary system with the cooperative jamming of the untrusted secondary system. The secondary system is untrusted for the primary system and willing to eavesdrop on the primary signal. In addition, the secondary system is also willing to provide friendly jamming to increase the secure rate of the primary system in reward for being allowed to share the licensed spectrum. Specifically, the cooperative communication is implemented into two slots which correspond to the transmission of the first and second hops of the primary system, respectively. In each slot, part of the slot is allocated for the primary information transmission. Simultaneously, a secondary user (SU) is selected to broadcast jamming signal to protect the secure communication of the primary users (PU) against the other untrusted SUs. Then, the remaining time of the slot is allocated for the secondary transmission. To maximize the transmission rate of the secondary system under the constraint of the target secure rate requirement of the primary system, we optimally select two jamming SUs and determine the time parameters in each slot. SUs' average transmit rate and the lower bound on PUs' secure outage probability are derived. Simulation results demonstrate the performance superiority of our developed strategy over conventional secure communication schemes in terms of PUs' secure outage probability and SUs' average transmission rate.
AB - This paper investigates the problem of secure communications of the two-hop primary system with the cooperative jamming of the untrusted secondary system. The secondary system is untrusted for the primary system and willing to eavesdrop on the primary signal. In addition, the secondary system is also willing to provide friendly jamming to increase the secure rate of the primary system in reward for being allowed to share the licensed spectrum. Specifically, the cooperative communication is implemented into two slots which correspond to the transmission of the first and second hops of the primary system, respectively. In each slot, part of the slot is allocated for the primary information transmission. Simultaneously, a secondary user (SU) is selected to broadcast jamming signal to protect the secure communication of the primary users (PU) against the other untrusted SUs. Then, the remaining time of the slot is allocated for the secondary transmission. To maximize the transmission rate of the secondary system under the constraint of the target secure rate requirement of the primary system, we optimally select two jamming SUs and determine the time parameters in each slot. SUs' average transmit rate and the lower bound on PUs' secure outage probability are derived. Simulation results demonstrate the performance superiority of our developed strategy over conventional secure communication schemes in terms of PUs' secure outage probability and SUs' average transmission rate.
KW - Cooperative Jamming
KW - Secure Communications
KW - Untrusted Secondary System
UR - http://www.scopus.com/inward/record.url?scp=84949518635&partnerID=8YFLogxK
U2 - 10.1109/IWCMC.2015.7289063
DO - 10.1109/IWCMC.2015.7289063
M3 - 会议稿件
AN - SCOPUS:84949518635
T3 - IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference
SP - 90
EP - 95
BT - IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th International Wireless Communications and Mobile Computing Conference, IWCMC 2015
Y2 - 24 August 2015 through 28 August 2015
ER -